Sciweavers

675 search results - page 82 / 135
» New reals: Can live with them, can live without them
Sort
View
ACSC
2003
IEEE
14 years 1 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
ELPUB
2000
ACM
14 years 2 days ago
XML: More Than an E-Publishing Language
XML is an SGML-based language designed for the interchange of documents with more flexible and powerful features than those provided by HTML. It can be considered as an intermedia...
Jaime Delgado, Ramon Martí, Xavier Perramon
ACNS
2006
Springer
138views Cryptology» more  ACNS 2006»
13 years 11 months ago
Syntax-Driven Private Evaluation of Quantified Membership Queries
Abstract. Membership queries are basic predicate operations that apply to datasets. Quantifications of such queries express global properties between datasets, including subset inc...
Aggelos Kiayias, Antonina Mitrofanova
IJWMC
2006
100views more  IJWMC 2006»
13 years 7 months ago
A microscopic study of power management in IEEE 802.11 wireless networks
IEEE 802.11 power-save mode (PSM) has been proposed in wireless LANs and multi-hop wireless networks to coordinate power states of wireless devices. In IEEE 802.11 PSM, power manag...
Chunyu Hu, Rong Zheng, Jennifer C. Hou, Lui Sha
CCS
2010
ACM
13 years 5 months ago
Ad hoc broadcast encryption
Numerous applications in ad hoc networks, peer-to-peer networks, and on-the-fly data sharing call for confidential broadcast without relying on a dealer. To cater for such applica...
Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferr...